Bulletin

An indispensable source of reference for anyone concerned with computer security, the Bulletin is the forum through which leading security researchers publish the latest security research and information in a bid to share knowledge with the security community. Publications cover the latest threats, new developments and techniques in the security landscape, opinions from respected members of the industry, and more. The Bulletin archives offer informative articles going back to 1989. Our editorial team is happy to hear from anyone interested in submitting a paper for publication.

Jobs for the naughty boys

UK's cyber security minister recruits team of former hackers.

Read more  

Spammer to serve time

Prolific spammer gets his just desserts.

Read more  

Kernel mechanics of Rustock

Chandra Prakash provides details of the kernel-mode operations of a recent (March 2009) version of Rustock, concentrating on the changes from its previous version.

Read more  

Can you spare a seg?

Peter Ferrie resumes his series of analyses of viruses contained in the EOF-rRlf-DoomRiderz virus zine.

Read more  

Early warning approaches to combat typosquatting

Typosquatting takes advantage of the typographical mistakes often made by users when entering a website address into a web browser. Amit Verma discusses a two-step approach to combatting the problem, prioritizing the registration of domain typos and…

Read more  

Anti-spam comparative review July 2009

Martijn Grooten (Virus Bulletin)

In VB’s second round of anti-spam comparative testing and certification the all-important question was whether the high achievers from the first test could maintain the same high standards this month. Martijn Grooten has the results of a test in…

Read more  

CARO mio, AMTSO mon amour

David Harley (ESET)

David Harley reports on two important industry gatherings that achieved the magic combination of social networking, the exchange of solid information, great entertainment and a beautiful setting: the CARO workshop and the latest AMTSO meeting.

Read more  

Malware without a name is still malware

'At the rate malware is currently released ... it may be that the specific naming of malware is a dead concept.' Lysa Myers, West Coast Labs.

Read more  

EICAR 2009 in a nutshell: ich bin ein EICARer

Testing, science fiction, a security legend and some magic - Eddy Willems describes the highlights of a sunny week in Berlin at the 19th EICAR conference.

Read more  

Obama pledges security education from boardroom to classroom

President Obama announces multi-billion-dollar cybersecurity effort.

Read more  

Search the Bulletin


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.